So I learned that if a MicroSD card gets snapped in half, its unrecoverable.
Okay, so suppose you were in war, and enemy soldiers were about to raid you. You just snap the cards in half and the data is un-recoverable, right?
So I learned that if a MicroSD card gets snapped in half, its unrecoverable.
Okay, so suppose you were in war, and enemy soldiers were about to raid you. You just snap the cards in half and the data is un-recoverable, right?
This does not appear to be correct.
That’s a consumer data recovery company. They aren’t going to use an electron microscope like a nation state, university, or dedicated emulation hacker.
https://www.pentestpartners.com/security-blog/how-to-read-from-an-eeprom/
https://www.researchgate.net/publication/312551555_Reverse_engineering_Flash_EEPROM_memories_using_Scanning_Electron_Microscopy
https://benjamin.computer/posts/2018-04-05-rom-reading.html
The first two links that you posted don’t appear to cover electron microscopy at all. The last appears to show a potential method of attack–which is noted in the link that I posted–but does not seem to show that it’s actually been successfully implemented. (“Using SEM operator-free acquisition and standard image processing technique we demonstrate the possible [emphasis added] automating of such technique over a full memory. […] The technique is a first step [emphasis added] for reverse engineering secure embedded systems.”)
This article is focused on reading them electrically.
I too have heard you can read flash storage with electron microscopes.